Summary
The host is running Virtual Vertex Muster and is prone to directory traversal vulnerability.
Impact
Successful exploitation will allow attacker to obtain sensitive information that could aid in further attacks.
Impact Level: Application
Solution
Upgrade to Virtual Vertex Muster version 6.2.0 or later.
For updates refer to http://www.vvertex.com/index.php
Insight
The flaw is due to improper validation of URI containing ../(dot dot) sequences, which allows attackers to read arbitrary files via directory traversal attacks.
Affected
Virtual Vertex Muster version 6.1.6
References
Severity
Classification
-
CVE CVE-2011-4714 -
CVSS Base Score: 5.0
AV:N/AC:L/Au:N/C:P/I:N/A:N
Related Vulnerabilities